StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Vulnerabilities - Research Paper Example

Cite this document
Summary
However, there are many associated threats and vulnerabilities that may breach any one of the three security fundamentals i.e. confidentiality, integrity and availability. Accordingly, during…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.9% of users find it useful
Vulnerabilities
Read Text Preview

Extract of sample "Vulnerabilities"

Full Paper Vulnerabilities Electronic mail is the most common way of communicating messages to the sender. However, there are many associated threats and vulnerabilities that may breach any one of the three security fundamentals i.e. confidentiality, integrity and availability. Accordingly, during transit, if the message is modified, integrity and confidentiality will be breached. Similarly, non-repudiation issues will also occur, if there is no Public Key Infrastructure (PKI) that is operated by separate third parties.

Likewise, the PKI is associated with digital certificates issued from a corporate authority i.e. Certificate Authority (CA) and is considered to be the most efficient control in terms of email security (Ellison & Schneier, 2000). In case of secure email, one has to make sure about the sender possessing the key is the one who is the authentic sender. Likewise, when signed email is verified, one of the checks includes the source of the email i.e. the sender. However, if encryption is applied to the public key infrastructure, there is a requirement of identifying people possessing the relevant key to decrypt the message (Ellison & Schneier, 2000).

This is the point where email certificates starts to operate, as the certificate ID is a digitally signed message from the CA that is transmitted to the user linked with the public key. However, the (PKI) possess many risks that may lead to vulnerabilities and in the end threats. One of the risks incorporates a breach of keys associated with the signer via unauthorized access or by any other means (Ellison & Schneier, 2000). However, efficient Certificate Authorities can mitigate risks by en effective physical security, personnel security and secure network.

Pretty Good Privacy ‘PGP’ counters these issues as well by incorporating ‘Web of Trust’ including self-governing signatures linked with the single certificate (Ellison & Schneier, 2000). Moreover, for addressing internal security, monitoring of employee emails is a regulatory requirement. However, there are many procedures, tasks and functions associated with it. The requirements can be met by utilizing tools from outlook express that are capable of retrieving certain keywords used in the email.

For example, the keyword ‘account’ can retrieve all emails including this specific word. (Bhatnagar, 2012). However, these outlook tools only work individually on each workstation and can be solved by incorporating Microsoft Exchange server. As the server will retrieve all emails of all employees containing the specific keyword, however, technical excellence is required in this regard. The second risk can be associated with the signer who does not know whether the information is certified or not.

PGP addresses this issue as well by providing efficient key signers who are aware of the person whose key is in process of sign. Moreover, one more CA was initiated by the credit bureau by utilizing the legacy data maintained in the database for authenticating emails online. However, this mechanism requires a shared secret data and credit bureau that does not have data associated with it, as data is available for sale (Ellison & Schneier, 2000). Consequently, it is a weak point or a vulnerability, as a hacker only requires an identity theft for gaining the certificate.

ReferencesBhatnagar, A. (2012). Is your email secure? Journal of Financial Planning, 25(3), 42-43.Ellison, C., & Schneier, B. (2000). Risks of PKI: Secure email. Communications of the ACM, 43(1), 160-160.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Vulnerabilities Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Vulnerabilities Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1598062-vulnerabilities
(Vulnerabilities Research Paper Example | Topics and Well Written Essays - 500 Words)
Vulnerabilities Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1598062-vulnerabilities.
“Vulnerabilities Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1598062-vulnerabilities.
  • Cited: 0 times

CHECK THESE SAMPLES OF Vulnerabilities

Practical Windows Security - The Identification of Vulnerabilities

This paper "Practical Windows Security - The Identification of Vulnerabilities" focuses on the fact that Common Vulnerabilities and Exposures or simply CVE is a record of information security Vulnerabilities and experiences that intend to offer frequent names for publicly recognized problems.... nbsp;… The objective of Common Vulnerabilities and Exposures is to make it rather easier to share data all through the alienated vulnerability potentials (repositories, expert tools as well as services) by means of this "common enumeration....
11 Pages (2750 words) Case Study

Network Vulnerabilities:

This research will summarize 10 common network Vulnerabilities into a table.... Most of people make use of them to copy their sensitive information from one system to another and use it NETWORK Vulnerabilities Network Vulnerabilities Affiliation Introduction This paper presents an overview of some of the common network Vulnerabilities.... This research will summarize 10 common network Vulnerabilities into a table....
2 Pages (500 words) Essay

Password Management Protocol vulnerabilities

Password Management Protocol Vulnerabilities By of the affiliation Department's Paper's Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information.... Password is one thing that can prevent other users from accessing various accounts networks and what is very important all kinds of confidential information....
2 Pages (500 words) Essay

SQL Injection Vulnerabilities

The aim of the paper "SQL Injection Vulnerabilities" is to provide comprehensive guidance on the use of the open source techniques and tools for independent identification of common SQL injection Vulnerabilities simulating the attacker's approaches.... Many high-profile intrusions have demonstrated the exploitation of these Vulnerabilities.... Exploiting SQL injection Vulnerabilities enables an attacker to persistently foist dynamic and storage page content generation that would include malicious code in the attacked site....
5 Pages (1250 words) Research Paper

Threats And Vulnerabilities Analysis

The essay "Threats And Vulnerabilities Analysis" analyzes threats and Vulnerabilities that the organization is likely to face.... This way, there will be proper engineering of the system's operation thereby avoiding Vulnerabilities such as poor administrative procedures....
6 Pages (1500 words) Coursework

Trusted Platform Module Vulnerabilities

This article "Trusted Platform Module Vulnerabilities" focuses on TPM, an overview, is known to offer a protection space for key operations, provide a safe place for storing sensitive information and other critical security tasks, and report and store integrity measurements.... aradharajan & Tupakula (2014) employ the attacker model as the methodology to study the Vulnerabilities of TPM....
7 Pages (1750 words) Article

WEP KEY and Its Vulnerabilities

This paper ''WEP KEY and Its Vulnerabilities'' tells that in the recent past, wide usage of wireless networks has been evident.... The Vulnerabilities of these wireless networks have also been established.... hellip; Analysis of these security Vulnerabilities calls for the need to safeguard the network against unauthorized access and cyber attacks proactively....
5 Pages (1250 words) Essay

Wi-Fi Protected Setup Vulnerabilities

This literature review "Wi-Fi Protected Setup Vulnerabilities" looks at the WPS and how it is used to enhance the security of wireless connections.... However, despite the numerous benefits that WPS has brought to the wireless connection in relation to security it is susceptible to certain flaws....
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us